Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3781

Опубликовано: 16 фев. 2022
Источник: debian
EPSS Средний

Описание

A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ghostscriptfixed9.53.3~dfsg-8package
ghostscriptnot-affectedbusterpackage
ghostscriptnot-affectedstretchpackage

Примечания

  • https://twitter.com/ducnt_/status/1434534373416574983

  • https://github.com/duc-nt/RCE-0-day-for-GhostScript-9.50

  • https://bugs.ghostscript.com/show_bug.cgi?id=704342

  • https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a9bd3dec9fde03327a4a2c69dad1036bf9632e20

EPSS

Процентиль: 93%
0.1208
Средний

Связанные уязвимости

CVSS3: 9.9
ubuntu
больше 3 лет назад

A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 9.8
redhat
почти 4 года назад

A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 9.9
nvd
больше 3 лет назад

A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

suse-cvrf
почти 4 года назад

Security update for ghostscript

suse-cvrf
почти 4 года назад

Security update for ghostscript

EPSS

Процентиль: 93%
0.1208
Средний